An identity-based security mechanism for P2P VoIP.
Hua JiangXianru DuYongxing JiaWeizhi WangPublished in: WCNIS (2010)
Keyphrases
- security mechanisms
- resource constrained
- peer to peer
- key management
- security issues
- access control
- security systems
- smart card
- security problems
- security requirements
- security protocols
- operating system
- signature scheme
- quality of service
- digital signature
- packet loss
- low power consumption
- security measures
- ip networks
- overlay network
- resource constraints
- sensor networks
- rfid tags
- low cost
- key distribution
- real time
- signcryption scheme
- information systems
- databases